Worth Reading: Quantum Computing and Cryptography All encryption is based on substitution, from simple schemes we did as kids to complex non-repeating patterns based on a long numerical key. Modern encryption systems construct these keys using a combination of private and public keys with mathematical one-way functions. —Jonathan Homa @ECI Related ← Worth Reading: Real Time Wide-Area TCP Latency MonitoringWorth Reading: GDPR meets whois →